This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 11 - 20 of 123
Filtering by

Clear all filters

152580-Thumbnail Image.png
Description
Tall buildings are spreading across the globe at an ever-increasing rate (www.ctbuh.org). The global number of buildings 200m or more in height has risen from 286 to 602 in the last decade alone. The increasing complexity of building architecture poses unique challenges in the structural design of modern tall buildings.

Tall buildings are spreading across the globe at an ever-increasing rate (www.ctbuh.org). The global number of buildings 200m or more in height has risen from 286 to 602 in the last decade alone. The increasing complexity of building architecture poses unique challenges in the structural design of modern tall buildings. Hence, innovative structural systems need to be evaluated to create an economical design that satisfies multiple design criteria. Design using traditional trial-and-error approach can be extremely time-consuming and the resultant design uneconomical. Thus, there is a need for an efficient numerical optimization tool that can explore and generate several design alternatives in the preliminary design phase which can lead to a more desirable final design. In this study, we present the details of a tool that can be very useful in preliminary design optimization - finite element modeling, design optimization, translating design code requirements into components of the FE and design optimization models, and pre-and post-processing to verify the veracity of the model. Emphasis is placed on development and deployment of various FE models (static, modal and dynamic analyses; linear, beam and plate/shell finite elements), design optimization problem formulation (sizing, shape, topology and material selection optimization) and numerical optimization tools (gradient-based and evolutionary optimization methods) [Rajan, 2001]. The design optimization results of full scale three dimensional buildings subject to multiple design criteria including stress, serviceability and dynamic response are discussed.
ContributorsSirigiri, Mamatha (Author) / Rajan, Subramaniam D. (Thesis advisor) / Neithalath, Narayanan (Committee member) / Mobasher, Barzin (Committee member) / Arizona State University (Publisher)
Created2014
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152649-Thumbnail Image.png
Description
The demand for portland cement concrete is expected to increase over time. There is a need to develop a more sustainable cementitious systems in order to reduce the negative environmental impacts associated with ordinary portland cement (OPC) production. An attempt is made to investigate sustainable binder solutions through the use

The demand for portland cement concrete is expected to increase over time. There is a need to develop a more sustainable cementitious systems in order to reduce the negative environmental impacts associated with ordinary portland cement (OPC) production. An attempt is made to investigate sustainable binder solutions through the use of alternative cementitious materials at high levels of volume replacement. Limestone, an abundant material is used as a filler in low water-to-powder concretes where a substantial fraction of the portland cement remains unhydrated. At high volume OPC replacement, 20% and 35%, the combination of limestone and an alumina source has been shown to improve mechanical and durability performance. At 20% OPC replacement levels the migration coefficient which is an indication of chloride penetration in concrete is lower than the OPC control mixture at 28 and 56 days of hydration. The use of limestone with a similar particle size distribution to that of the OPC is used in each of these blended systems. A 20% binary limestone blend provide similar strength to an OPC mortar at all ages and comparable transport properties to that of the OPC concrete. Fly ash and metakaolin are the two alumina sources for the ternary blended mixes with concrete. The metakaolin shows the highest increase in the amount of hydration products formed out of all the mixes, including calcium-silicate-hydrate and carboaluminate phases in combination with limestone powder. At both levels of replacement the metakaolin blends show a substantially lower migration coefficient which is contributed to the smaller pore sizes found in the metakaolin blends. The fracture response of these systems show that at all replacement levels the ductility of the systems increase indicated by the large critical crack tip opening displacement. The fracture toughness is the highest for the blend containing metakaolin indicative of the smaller pore sizes allowing more dissipation of energy. An attempt is made to relate all mechanical and durability parameters to the reaction products and pore-structure developing at later ages.
ContributorsAguayo, Matthew (Author) / Neithalath, Narayanan (Thesis advisor) / Rajan, Subramaniam D. (Committee member) / Mobasher, Barzin (Committee member) / Arizona State University (Publisher)
Created2014
152278-Thumbnail Image.png
Description
The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there

The digital forensics community has neglected email forensics as a process, despite the fact that email remains an important tool in the commission of crime. Current forensic practices focus mostly on that of disk forensics, while email forensics is left as an analysis task stemming from that practice. As there is no well-defined process to be used for email forensics the comprehensiveness, extensibility of tools, uniformity of evidence, usefulness in collaborative/distributed environments, and consistency of investigations are hindered. At present, there exists little support for discovering, acquiring, and representing web-based email, despite its widespread use. To remedy this, a systematic process which includes discovering, acquiring, and representing web-based email for email forensics which is integrated into the normal forensic analysis workflow, and which accommodates the distinct characteristics of email evidence will be presented. This process focuses on detecting the presence of non-obvious artifacts related to email accounts, retrieving the data from the service provider, and representing email in a well-structured format based on existing standards. As a result, developers and organizations can collaboratively create and use analysis tools that can analyze email evidence from any source in the same fashion and the examiner can access additional data relevant to their forensic cases. Following, an extensible framework implementing this novel process-driven approach has been implemented in an attempt to address the problems of comprehensiveness, extensibility, uniformity, collaboration/distribution, and consistency within forensic investigations involving email evidence.
ContributorsPaglierani, Justin W (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Santanam, Raghu T (Committee member) / Arizona State University (Publisher)
Created2013
152495-Thumbnail Image.png
Description
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server

Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server to enforce access policies on the data, services and other such resources fairly easily. It also accommodates new policies and changes to existing policies gracefully, thereby making it a potentially good mechanism for implementing access control in large systems, particularly in today's age of Cloud Computing. However management of the attributes in ABAC environment is an area that has been little touched upon. Having a mechanism to allow multiple ABAC based systems to share data and resources can go a long way in making ABAC scalable. At the same time each system should be able to specify their own attribute sets independently. In the research presented in this document a new mechanism is proposed that would enable users to share resources and data in a cloud environment using ABAC techniques in a distributed manner. The focus is mainly on decentralizing the access policy specifications for the shared data so that each data owner can specify the access policy independent of others. The concept of ontologies and semantic web is introduced in the ABAC paradigm that would help in giving a scalable structure to the attributes and also allow systems having different sets of attributes to communicate and share resources.
ContributorsPrabhu Verleker, Ashwin Narayan (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
152385-Thumbnail Image.png
Description
This thesis addresses the ever increasing threat of botnets in the smartphone domain and focuses on the Android platform and the botnets using Online Social Networks (OSNs) as Command and Control (C&C;) medium. With any botnet, C&C; is one of the components on which the survival of botnet depends. Individual

This thesis addresses the ever increasing threat of botnets in the smartphone domain and focuses on the Android platform and the botnets using Online Social Networks (OSNs) as Command and Control (C&C;) medium. With any botnet, C&C; is one of the components on which the survival of botnet depends. Individual bots use the C&C; channel to receive commands and send the data. This thesis develops active host based approach for identifying the presence of bot based on the anomalies in the usage patterns of the user before and after the bot is installed on the user smartphone and alerting the user to the presence of the bot. A profile is constructed for each user based on the regular web usage patterns (achieved by intercepting the http(s) traffic) and implementing machine learning techniques to continuously learn the user's behavior and changes in the behavior and all the while looking for any anomalies in the user behavior above a threshold which will cause the user to be notified of the anomalous traffic. A prototype bot which uses OSN s as C&C; channel is constructed and used for testing. Users are given smartphones(Nexus 4 and Galaxy Nexus) running Application proxy which intercepts http(s) traffic and relay it to a server which uses the traffic and constructs the model for a particular user and look for any signs of anomalies. This approach lays the groundwork for the future host-based counter measures for smartphone botnets using OSN s as C&C; channel.
ContributorsKilari, Vishnu Teja (Author) / Xue, Guoliang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2013
152773-Thumbnail Image.png
Description
The main objective of this study is to numerically investigate: (i) the ionic transport, especially chloride ion penetration into cementitious materials under imposed electric fields, and (ii) moisture transport through cracked concretes as a function of the crack geometry. Numerical methods were implemented to simulate the ionic transport process, based

The main objective of this study is to numerically investigate: (i) the ionic transport, especially chloride ion penetration into cementitious materials under imposed electric fields, and (ii) moisture transport through cracked concretes as a function of the crack geometry. Numerical methods were implemented to simulate the ionic transport process, based on coupling the Nernst-Planck equation and Poisson's equation to account for transport dominated by electromigration. This mathematical model was also modified to account for the chloride binding mechanism (physical and chemical trapping of chlorides by the cement hydrates) and the concentration dependence of the diffusion coefficient of each ion in the transport process. To validate the numerical model, experimental data from a companion work was used in this study. The non-steady state migration test, which is one of the common accelerated chloride ion transport test, is numerically simulated. The simulation provides a linear relationship between ionic concentration and ionic flux, which indicates that the diffusion part is negligible under a strong external voltage environment. The numerical models along with adjustments for the concentration-dependent diffusion coefficients, a pore structure factor (from electrical measurements) and chloride binding considerations are found to be successful in predicting the chloride penetration depth into plain and modified concretes under imposed electrical potentials. Moisture transport through cracked concrete was examined in the second part of this thesis. To better understand the crack's influence on the permeability, modified Louis' equation was chosen to relate the permeability with crack characteristics. 3D concrete crack models were developed using a MATLAB program with distinct crack tortuosities, roughnesses and sizes. As a comparison, Navier-Stokes equation and the Lattice Boltzmann method were also applied on the 3D model of the cracked concrete to evaluate their permeability. The methodology developed here is expected to be useful in understanding the influence of cracking on moisture transport, and when properly coupled with an ionic transport model that will be further developed, helps comprehensively understand the coupling effects of moisture and ionic transport on deterioration in concrete structures.
ContributorsYang, Pu (Author) / Neithalath, Narayanan (Thesis advisor) / Dharmarajan, Subramaniam (Committee member) / Mobasher, Barzin (Committee member) / Arizona State University (Publisher)
Created2014
152874-Thumbnail Image.png
Description
The widespread adoption of mobile devices gives rise to new opportunities and challenges for authentication mechanisms. Many traditional authentication mechanisms become unsuitable for smart devices. For example, while password is widely used on computers as user identity authentication, inputting password on small smartphone screen is error-prone and not convenient. In

The widespread adoption of mobile devices gives rise to new opportunities and challenges for authentication mechanisms. Many traditional authentication mechanisms become unsuitable for smart devices. For example, while password is widely used on computers as user identity authentication, inputting password on small smartphone screen is error-prone and not convenient. In the meantime, there are emerging demands for new types of authentication. Proximity authentication is an example, which is not needed for computers but quite necessary for smart devices. These challenges motivate me to study and develop novel authentication mechanisms specific for smart devices.

In this dissertation, I am interested in the special authentication demands of smart devices and about to satisfy the demands. First, I study how the features of smart devices affect user identity authentications. For identity authentication domain, I aim to design a continuous, forge-resistant authentication mechanism that does not interrupt user-device interactions. I propose a mechanism that authenticates user identity based on the user's finger movement patterns. Next, I study a smart-device-specific authentication, proximity authentication, which authenticates whether two devices are in close proximity. For prox- imity authentication domain, I aim to design a user-friendly authentication mechanism that can defend against relay attacks. In addition, I restrict the authenticated distance to the scale of near field, i.e., a few centimeters. My first design utilizes a user's coherent two-finger movement on smart device screen to restrict the distance. To achieve a fully-automated system, I explore acoustic communications and propose a novel near field authentication system.
ContributorsLi, Lingjun (Author) / Xue, Guoliang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Ye, Jieping (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2014
152932-Thumbnail Image.png
Description
The main objective of this study is to investigate drying properties and plastic shrinkage cracking resistance of fresh cement-based pastes reinforced with fibers and textiles. Naturally occurring mineral wollastonite has been studied independently as well as in combination with AR-glass textile. A series of blended mixes with Portland cement and

The main objective of this study is to investigate drying properties and plastic shrinkage cracking resistance of fresh cement-based pastes reinforced with fibers and textiles. Naturally occurring mineral wollastonite has been studied independently as well as in combination with AR-glass textile. A series of blended mixes with Portland cement and wollastonite nano-fibers were developed and tested under low vacuum conditions to simulate severe evaporation conditions and expedite the drying process causing plastic shrinkage cracks. Cumulative moisture loss, evaporation rates, and diffusivity were analyzed by means of a 2-stage diffusion simulation approach, developed previously in Arizona State University. Effect of fiber-matrix interaction on the transport properties of the composite were evaluated using the existing approach. Morphology of the cracked surface was investigated by the means of image analysis wherein length, width, area and density of the cracks were computed to help characterize the contribution of fiber and textile in the cracking phenomenon. Additionally, correlation between cumulative moisture loss and crack propagation was attempted. The testing procedures and associated analytical methods were applied to evaluate effectiveness of four wollastonite fiber sizes and also a hybrid reinforcement system with alkali-resistant glass (ARG) textile in improving shrinkage cracking related parameters. Furthermore, the experimental and analytical approach was extended to magnified version of the existing shrinkage testing set-up to study the size effect of these composites when subjected to matching drying conditions. Different restraining mechanisms were used to study the simulation of the cracking phenomena on a larger specimen. Paste and mortar formulations were developed to investigate size effect on shrinkage resistance of cementitious composites.
ContributorsKachala, Robert (Author) / Mobasher, Barzin (Thesis advisor) / Dharmarajan, Subramaniam (Committee member) / Neithalath, Narayanan (Committee member) / Arizona State University (Publisher)
Created2014
152842-Thumbnail Image.png
Description
Concrete is the most widely used infrastructure material worldwide. Production of portland cement, the main binding component in concrete, has been shown to require significant energy and account for approximately 5-7% of global carbon dioxide production. The expected continued increased use of concrete over the coming decades indicates this is

Concrete is the most widely used infrastructure material worldwide. Production of portland cement, the main binding component in concrete, has been shown to require significant energy and account for approximately 5-7% of global carbon dioxide production. The expected continued increased use of concrete over the coming decades indicates this is an ideal time to implement sustainable binder technologies. The current work aims to explore enhanced sustainability concretes, primarily in the context of limestone and flow. Aspects such as hydration kinetics, hydration product formation and pore structure add to the understanding of the strength development and potential durability characteristics of these binder systems. Two main strategies for enhancing this sustainability are explored in this work: (i) the use of high volume limestone in combination with other alternative cementitious materials to decrease the portland cement quantity in concrete and (ii) the use of geopolymers as the binder phase in concrete. The first phase of the work investigates the use of fine limestone as cement replacement from the perspective of hydration, strength development, and pore structure. The nature of the potential synergistic benefit of limestone and alumina will be explored. The second phase will focus on the rheological characterization of these materials in the fresh state, as well as a more general investigation of the rheological characterization of suspensions. The results of this work indicate several key ideas. (i) There is a potential synergistic benefit for strength, hydration, and pore structure by using alumina and in portland limestone cements, (ii) the limestone in these systems is shown to react to some extent, and fine limestone is shown to accelerate hydration, (iii) rheological characteristics of cementitious suspensions are complex, and strongly dependent on several key parameters including: the solid loading, interparticle forces, surface area of the particles present, particle size distribution of the particles, and rheological nature of the media in which the particles are suspended, and (iv) stress plateau method is proposed for the determination of rheological properties of concentrated suspensions, as it more accurately predicts apparent yield stress and is shown to correlate well with other viscoelastic properties of the suspensions.
ContributorsVance, Kirk (Author) / Neithalath, Narayanan (Thesis advisor) / Rajan, Subramaniam D. (Committee member) / Mobasher, Barzin (Committee member) / Chawla, Nikhilesh (Committee member) / Marzke, Robert (Committee member) / Arizona State University (Publisher)
Created2014